Encryption and Secure Computer Networks
ACM Computing Surveys (CSUR)
Secure personal computing in an insecure network
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
ACM SIGOPS Operating Systems Review
ACM SIGSAC Review
ACM SIGOPS Operating Systems Review
Efficient and timely mutual authentication
ACM SIGOPS Operating Systems Review
A model to order the encryption algorithms according to their quality
ACM SIGCOMM Computer Communication Review
SOSP '89 Proceedings of the twelfth ACM symposium on Operating systems principles
ACM Transactions on Computer Systems (TOCS)
The use of encryption in Kerberos for network authentication (invited)
CRYPTO '89 Proceedings on Advances in cryptology
A security risk of depending on synchronized clocks
ACM SIGOPS Operating Systems Review
A nonce-based protocol for multiple authentications
ACM SIGOPS Operating Systems Review
A note on the use of timestamps as nonces
ACM SIGOPS Operating Systems Review
Authentication in distributed systems: a bibliography
ACM SIGOPS Operating Systems Review
Lower bounds on messages and rounds for network authentication protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
On simple and secure key distribution
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Optimal privacy and authentication on a portable communications system
ACM SIGOPS Operating Systems Review
A security architecture for fault-tolerant systems
ACM Transactions on Computer Systems (TOCS) - Special issue on computer architecture
An efficient and secure authentication protocol using uncertified keys
ACM SIGOPS Operating Systems Review
Refinement and extension of encrypted key exchange
ACM SIGOPS Operating Systems Review
Secure communication using remote procedure calls
ACM Transactions on Computer Systems (TOCS)
The KryptoKnight family of light-weight protocols for authentication and key distribution
IEEE/ACM Transactions on Networking (TON)
Provably secure session key distribution: the three party case
STOC '95 Proceedings of the twenty-seventh annual ACM symposium on Theory of computing
Prudent Engineering Practice for Cryptographic Protocols
IEEE Transactions on Software Engineering
ACM SIGOPS Operating Systems Review
An approach to the formal verification of cryptographic protocols
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Supporting multi-user, multi-applet workspaces in CBE
CSCW '96 Proceedings of the 1996 ACM conference on Computer supported cooperative work
On the properties of cryptographic protocols and the weaknesses of the BAN-like logics
ACM SIGOPS Operating Systems Review
Extending NCP for protocols using public keys
Mobile Networks and Applications - Special issue: protocols for mobile environments
Clarifying straight replays and forced delays
ACM SIGOPS Operating Systems Review
An authentication-combined access control scheme using a geometric approach in distributed systems
SAC '97 Proceedings of the 1997 ACM symposium on Applied computing
Paradigm shifts in protocol analysis
Proceedings of the 1999 workshop on New security paradigms
A key distribution protocol using event markers
ACM Transactions on Computer Systems (TOCS)
Authentication in office system internetworks
ACM Transactions on Information Systems (TOIS)
Authentication of signatures using public key encryption
Communications of the ACM
Dynamic analysis of security protocols
Proceedings of the 2000 workshop on New security paradigms
An environment for security protocol intrusion detection
Journal of Computer Security
On virtual private networks security design issues
Computer Networks: The International Journal of Computer and Telecommunications Networking
Using SPIN to Verify Security Properties of Cryptographic Protocols
Proceedings of the 9th International SPIN Workshop on Model Checking of Software
Secure Key-Evolving Protocols for Discrete Logarithm Schemes
CT-RSA '02 Proceedings of the The Cryptographer's Track at the RSA Conference on Topics in Cryptology
Proof Techniques for Cryptographic Protocols
ICAL '99 Proceedings of the 26th International Colloquium on Automata, Languages and Programming
The Logic of Authentication Protocols
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Notes on Nominal Calculi for Security and Mobility
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Applying NCP Logic to the Analysis of SSL 3.0
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
The Risks of Compromising Secret Information
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Password-Authenticated Key Exchange between Clients with Different Passwords
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Security Protocols and Specifications
FoSSaCS '99 Proceedings of the Second International Conference on Foundations of Software Science and Computation Structure, Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS'99
Systematic Design of Two-Party Authentication Protocols
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Thwarting Timing Attacks Using ATM Networks
Revised Papers from the 9th International Workshop on Security Protocols
Suitability of a Classical Analysis Method for E-commerce Protocols
ISC '01 Proceedings of the 4th International Conference on Information Security
A HOL extension of GNY for automatically analyzing cryptographic protocols
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
Some new attacks upon security protocols
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
Distributed Authentication in Kerberos Using Public Key Cryptography
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
An Interface Specification Language For Automatically Analyzing Cryptographic Protocols
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
An Adaptable and Reliable Authentication Protocol for Communication Networks
INFOCOM '97 Proceedings of the INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
Scalability and Flexibility in Authentication Services: The KryptoKnight Approach
INFOCOM '97 Proceedings of the INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
An Efficient Cryptographic Protocol Verifier Based on Prolog Rules
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Extending NCP for protocols using public keys
ICCCN '95 Proceedings of the 4th International Conference on Computer Communications and Networks
A composable cryptographic library with nested operations
Proceedings of the 10th ACM conference on Computer and communications security
Using backward strategy to the Needham-Schroeder public key protocol verification
Artificial intelligence and security in computing systems
Authentication: a practical study in belief and action
TARK '88 Proceedings of the 2nd conference on Theoretical aspects of reasoning about knowledge
A decision procedure for the verification of security protocols with explicit destructors
Proceedings of the 11th ACM conference on Computer and communications security
ENDL: A Logical Framework for Verifying Secure Transaction Protocols
Knowledge and Information Systems
Theoretical Computer Science - Special issue: Foundations of wide area network computing
Formal analysis of modern security protocols
Information Sciences—Informatics and Computer Science: An International Journal
Efficient network authentication protocols: lower bounds and optimal implementations
Distributed Computing
Security protocols: from linear to classical logic by abstract interpretation
Information Processing Letters
Timed spi-calculus with types for secrecy and authenticity
CONCUR 2005 - Concurrency Theory
Static validation of security protocols
Journal of Computer Security
SKMA: a key management architecture for SCADA systems
ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
Deriving the type flaw attacks in the Otway-Rees protocol by rewriting
Nordic Journal of Computing - Selected papers of the 17th nordic workshop on programming theory (NWPT'05), October 19-21, 2005
Verification of cryptographic protocols: tagging enforces termination
Theoretical Computer Science - Foundations of software science and computation structures
A survey of algebraic properties used in cryptographic protocols
Journal of Computer Security
Efficient verifier-based password-authenticated key exchange in the three-party setting
Computer Standards & Interfaces
A set of protocols for micropayments in distributed systems
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
Kerberos security with clocks adrift
SSYM'95 Proceedings of the 5th conference on USENIX UNIX Security Symposium - Volume 5
Implementation of IPv6 in 4.4 BSD
ATEC '96 Proceedings of the 1996 annual conference on USENIX Annual Technical Conference
EC2C-PAKA: An efficient client-to-client password-authenticated key agreement
Information Sciences: an International Journal
Information Sciences: an International Journal
A Comprehensive Framework for Enhancing Security in InfiniBand Architecture
IEEE Transactions on Parallel and Distributed Systems
Formalising theories of trust for authentication protocols
Information Systems Frontiers
A formalism for visual security protocol modeling
Journal of Visual Languages and Computing
Modeling and Verifying Time Sensitive Security Protocols with Constraints
Electronic Notes in Theoretical Computer Science (ENTCS)
Recursive protocol for group-oriented authentication with key distribution
Journal of Systems and Software
Proceedings of the 10th international ACM SIGPLAN conference on Principles and practice of declarative programming
A distributed expansible authentication model based on Kerberos
Journal of Network and Computer Applications
Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Minimal backups of cryptographic protocol runs
Proceedings of the 6th ACM workshop on Formal methods in security engineering
Entity Based Message Authentication System
KES-AMSTA '07 Proceedings of the 1st KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
The implementation of a cryptography-based secure office system
AFIPS '82 Proceedings of the June 7-10, 1982, national computer conference
Rewriting Techniques in the Constraint Solver
Electronic Notes in Theoretical Computer Science (ENTCS)
Journal of Systems Architecture: the EUROMICRO Journal
Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps
AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
Automatic verification of correspondences for security protocols
Journal of Computer Security
A framework for abstract interpretation of timed concurrent constraint programs
PPDP '09 Proceedings of the 11th ACM SIGPLAN conference on Principles and practice of declarative programming
Authenticated Key Exchange Protocol in One-Round
ICA3PP '09 Proceedings of the 9th International Conference on Algorithms and Architectures for Parallel Processing
Computer Standards & Interfaces
Formalizing and Analyzing the Needham-Schroeder Symmetric-Key Protocol by Rewriting
Electronic Notes in Theoretical Computer Science (ENTCS)
The ρ-spi Calculus at Work: Authentication Case Studies
Electronic Notes in Theoretical Computer Science (ENTCS)
Real-or-random Key Secrecy of the Otway-Rees Protocol via a Symbolic Security Proof
Electronic Notes in Theoretical Computer Science (ENTCS)
Security protocols: from linear to classical logic by abstract interpretation
Information Processing Letters
Verifier-based password-authenticated key exchange protocol in cross-realm setting
CCDC'09 Proceedings of the 21st annual international conference on Chinese control and decision conference
Anonymity services for multi-agent systems
Web Intelligence and Agent Systems
Computationally secure two-round authenticated message exchange
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Authenticated key exchange secure against dictionary attacks
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
EPA: an efficient password-based protocol for authenticated key exchange
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
EAP using the split password-based authenticated key agreement
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Environmental requirements for authentication protocols
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Verifying the purchase request in SET protocol
APWeb'03 Proceedings of the 5th Asia-Pacific web conference on Web technologies and applications
Protocol verification via rigid/flexible resolution
LPAR'07 Proceedings of the 14th international conference on Logic for programming, artificial intelligence and reasoning
A formal analysis for capturing replay attacks in cryptographic protocols
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
3-party approach for fast handover in EAP-based wireless networks
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
Security protocols: principles and calculi tutorial notes
Foundations of security analysis and design IV
Secure transaction protocol analysis: models and applications
Secure transaction protocol analysis: models and applications
A secure and efficient SIP authentication scheme for converged VoIP networks
Computer Communications
Computational soundness of symbolic zero-knowledge proofs
Journal of Computer Security - 7th International Workshop on Issues in the Theory of Security (WITS'07)
Finite models for formal security proofs
Journal of Computer Security - 7th International Workshop on Issues in the Theory of Security (WITS'07)
SP'88 Proceedings of the 1988 IEEE conference on Security and privacy
Dealing with inconsistent secure messages by weighting majority
Knowledge-Based Systems
Provably secure and efficient authentication techniques for the global mobility network
Journal of Systems and Software
Security'08 Proceedings of the 16th International conference on Security protocols
Location verification based defense against sybil attack in sensor networks
ICDCN'06 Proceedings of the 8th international conference on Distributed Computing and Networking
Authenticated key agreement without subgroup element verification
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I
On session key construction in provably-secure key establishment protocols
Mycrypt'05 Proceedings of the 1st international conference on Progress in Cryptology in Malaysia
Analyzing security protocols using association rule mining
AI'05 Proceedings of the 18th Australian Joint conference on Advances in Artificial Intelligence
Detecting collusion attacks in security protocols
APWeb'06 Proceedings of the 8th Asia-Pacific Web conference on Frontiers of WWW Research and Development
A secure password-authenticated key exchange between clients with different passwords
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
A one-time password authentication scheme for secure remote access in intelligent home networks
KES'06 Proceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
A light weight authentication protocol for digital home networks
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
Strengthening password-based authentication protocols against online dictionary attacks
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
N-Party encrypted diffie-hellman key exchange using different passwords
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Robust and simple authentication protocol for secure communication on the web
ICWE'05 Proceedings of the 5th international conference on Web Engineering
Tree automata with equality constraints modulo equational theories
IJCAR'06 Proceedings of the Third international joint conference on Automated Reasoning
Justifying a dolev-yao model under active attacks
Foundations of Security Analysis and Design III
Secure password authentication for keystroke dynamics
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
Formal verification of a type flaw attack on a security protocol using object-z
ZB'05 Proceedings of the 4th international conference on Formal Specification and Development in Z and B
A protocol for secure public instant messaging
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
Security protocols verification in abductive logic programming: a case study
ESAW'05 Proceedings of the 6th international conference on Engineering Societies in the Agents World
One-Round protocol for two-party verifier-based password-authenticated key exchange
CMS'06 Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Provably-Secure two-round password-authenticated group key exchange in the standard model
IWSEC'06 Proceedings of the 1st international conference on Security
A diffie-hellman key exchange protocol without random oracles
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
A novel common control channel security framework for cognitive radio networks
International Journal of Autonomous and Adaptive Communications Systems
Union and intersection types for secure protocol implementations
TOSCA'11 Proceedings of the 2011 international conference on Theory of Security and Applications
G2C: cryptographic protocols from goal-driven specifications
TOSCA'11 Proceedings of the 2011 international conference on Theory of Security and Applications
Research: Secure and minimal protocols for authenticated key distribution
Computer Communications
Research: Remote login authentication scheme based on a geometric approach
Computer Communications
Research note: Group-oriented authentication mechanism with key exchange
Computer Communications
A timestamp model for determining real-time communications in intelligent networks
Computer Communications
Security protocol verification: symbolic and computational models
POST'12 Proceedings of the First international conference on Principles of Security and Trust
Tutorial: Efficient and secure password-based authentication protocols against guessing attacks
Computer Communications
Intelligent home network authentication: S/key-based home device authentication
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
Multimedia Tools and Applications
Journal of Computer Security - Foundational Aspects of Security
Hi-index | 48.23 |
The distribution of keys in a computer network using single key or public key encryption is discussed. We consider the possibility that communication keys may be compromised, and show that key distribution protocols with timestamps prevent replays of compromised keys. The timestamps have the additional benefit of replacing a two-step handshake.